An Introduction to Sysadmin Training

Size: px
Start display at page:

Download "An Introduction to Sysadmin Training"

Transcription

1 EuroBSDCon 2004 Karlsruhe, Germany: An Introduction to Sysadmin Training in the Virtual Unix Lab Hubert Feyrer October 31st, 2004 Abstract The Virtual Unix Lab (vulab) is an interactive course system which allows students to do Unix system administration exercises. Machines are installed on which students can do their assignments with full root -access. At the end, the system checks which parts were done correctly, and gives a feedback on the exercise result. Access to the lab is via the Internet via a web-browser as well as standard Unix clients (ssh, telnet, ftp). Some detail on exercise-verification are outlined in this paper. Contents 1 Introduction & Background 2 2 The Virtual Unix Lab 2 3 A Tour trough the Virtual Unix Lab User Area Admin Area Creating New Exercises Setup Hardware Lab Machine Installation Restricting Access to Lab Machines Software Current Status 32 6 Future Perspectives 32 References 32

2 1 Introduction & Background A problem in teaching Unix system administration is the lack of machines available on which students can practice with full system administrator privileges. Without system administrator (root) privileges, many things cannot be practiced. On the other handside, when handing out root privileges, the lab machines are in an unknown state, requiring reinstallation of the lab machines for future students to get a known safe & well-configured environment. The Virtual Unix Lab was created to solve this problem. 2 The Virtual Unix Lab The Virtual Unix Laboratory was started in the Praktikum Unix Cluster Setup project in the Hochschul- und Wissenschaftsprogramm (HWP) initiative at the University of Applied Sciences of Regensburg (FH Regensburg). It was designed as an interactive course system for system administration training in general, and with a focus on training installation and configuration of the Network File System (NFS) and Network Information System (NIS) on Unix-based systems in particular. The Virtual Unix Lab fulfills this purpose today. After sign-up, machines are installed on demand, and students can do their assignments with full root -access. Users can book exercises for a certain time, and all machines are setup identically. Exclusive access to the lab machines during exercises is guaranteed, with access to the lab being realized via the Internet via a web-browser as well as standard Unix clients (ssh, telnet, ftp). At the end of the assignment, the system checks if/which parts were done correctly, and gives a report containing feedback on the success of the exercise to the student. After that, machines are re-installed from scratch for next user and exercises. 3 A Tour trough the Virtual Unix Lab The tour through the Virtual Unix Lab covers both the parts that the users will see while using the system as well as a few areas which cover administrative actions plus an overview of the steps for updating and creating a new exercise. 3.1 User Area This tour through the user area of the Virtual Unix Lab covers the following areas: Login and account creation List of exercises Booking an exercise Taking an exercise Retrieving feedback afterwards The tour itself will consist of a number of screenshots displaying the various parts of the web based user interface that the Virtual Unix Lab presents. 1. Access to the user interface of the Virtual Unix Lab is through a web browser, which allows accessing all facilities provided, except performing exercises themselves (see

3 Figure 1: Logging into the Virtual Unix Lab below). Language of the user interface is German (only) right now internationalisation is on the list of items to do in the future. When accessing the webpage, the first thing students encounter is a mask to login as displayed in figure If a student doesn t have a login yet, he can create a new login ( Profile ) using the form displayed in figure 2. The student will have to give his student ID number ( Matrikel-Nummer ), first and last name, an address where he can be reached and a password (twice). Upon registering, an will be sent to the given address, which contains an authentication token that the user has to enter to permanently enable his account. Accounts not enabled that way will be deleted after 7 days. This allows instant access to the lab, but ensures that people provide at least a valid address if they want to keep using the lab. 3. After successful login into the Virtual Unix Lab, the welcome screen shown in figure 3 is displayed and users can choose from several actions they want to do: Update their user settings ( Benutzerdaten ), get a list of available exercises ( Übungen auflisten ), book an exercise for a certain time & date ( Buchung vornehmen ), get a list of past and future exercises, delete future exercises and retrieve feedback on past ones ( Buchungen einsehen ) as well as logout of the web site: 4. Figure 4 shows a list of exercises available in the Virtual Unix Lab, including the exercise name ( Übung ), a one-line description of the exercise ( Bezeichnung ) and duration of the exercise for the user ( Dauer ): 5. Each of the exercises in the list can be clicked on to retrieve the exercise text as shown when actually taking the exercises, see figure 5 for an example. This allows preparing the exercises, and learning all the items necessary to successfully perform the exercise in the Virtual Unix Lab. 6. After these preparations, an exercise can be booked by selecting the übung buchen

4 Figure 2: Entering data for a new login menu item. The first step in booking an exercise consists of deciding at which date and time to take the exercise, which is displayed in figure 6. Exercises are available in three-hour intervals (1.5 hours for the exercise, plus about one hour for preparation of the lab machines and some time for postprocessing), slots already booked by other users are not displayed as available. In the above screenshot, the exercises at 0am, 3am, 6am, 9am and 12am are not available because of that. 7. After deciding on the date and time for the exercise to take place, the next step is to choose which actual exercise to take, from the list of available exercises. As in the previous list of available exercises, the exercise name, description and duration are displayed, and the user has to decide for one as displayed in figure After selecting date & time and which course to take, a final confirmation shown in figure 8 has to be made before the exercise is booked. 9. The exercise is booked now, and the system will know when to prepare the lab machines for the exercises, using an at(1) job. The student can walk away, prepare for the exercise or whatever, and as for a real test, he should come back to the lab a few minutes before the selected time of the exercises, logging in again, see figure After the user has logged in, the system will tell him that an exercise was prepared for him (and which one), and that he can already start preparing the exercise by following the provided link ( bitte hier klicken in the red text) as displayed in figure Before starting the exercise, the student has to enter the IP address of the machine from which he wants to access the lab machines. This process, shown in figure 11, is needed to restrict access so other students cannot disturb the exercise. What happens when the user has entered his IP number here is that appropriate rules will be injected into the firewall covering the lab machines to allow access to the lab machines only from the given hostname when the exercise starts.

5 Figure 3: Welcome to the Virtual Unix Lab

6 Figure 4: List of available exercises Figure 5: Exercise text preview

7 Figure 6: Booking an exercise: selecting date & time 12. Just as in a real test, the student can come into the lab and sit down, but the test won t start until a certain time. In a real lab test, this would be when the teacher passes out sheets of paper with the exercises printed on them. In the Virtual Unix Lab, the student has to wait for the start of the exercise too, as displayed in figure When exercise time is reached, the firewall protecting the lab systems will be opened to allow access to the lab systems, and the exercise will be displayed as e.g. in figure 13. The text displayed here is the same as was available for looking at before, so students were able to prepare properly, with a few small additions. First, a link with help for accessing the lab systems is placed under the exercise text, so students not familiar with the lab (yet) can make themselves familiar how to access the lab machines, giving proper syntax for telnet, ftp and ssh. Below this link, the time remaining for the exercise is printed on the lower left ( Verbleibende Zeit ), and if the user decides she has finished the exercise before the time runs out, this can be stated by pressing the Fertig! -button. 14. For accessing the lab machines, separate terminal windows have to be opened to access the lab machines and perform the tasks needed to successfully solve the tasks given in the exercise text as shown in figure 14. Figure 14 shows access to a Solaris/sparc (left xterm) and NetBSD/sparc (right xterm) system. For each system, the user knows a normal user account and password (without any system privileges) as well as the system administrator (root) password, given in the instructions on how to access the lab machines. The student can the use any measures he seems appropriate to solve the tasks, using the full administrative privileges he has available. If one of the lab machines has to be rebooted, this can be done as with any normal remotely administrated machine (i.e.: there is no access to the console, right now). 15. After the exercise has ended either because time ran out, or because the student

8 Figure 7: Booking an exercise: selecting the exercise

9 Figure 8: Booking an exercise: confirmation Figure 9: Logging in for a booked exercise

10 Figure 10: An exercise is prepared & waiting Figure 11: Configuring access to the lab machines

11 Figure 12: Waiting for start of exercise time signalled he s done by pushing the Fertig! -button the system will revoke access to the lab systems by re-enabling the firewall, and print a message that the exercise is over and that feedback on the exercise can be retrieved from the database within a few minutes as shown in figure 15. At this point, the lab systems are analyzed in the background by a number of scripts, which know what configuration steps are necessary for successful performance of the exercise, and which will report their findings in the database for later retrieval (see below for more on this). 16. After an exercise has finished, students can retrieve feedback on an individual exercise via the main menu ( Buchungen einsehen ). They will see the exercise text again, with the various tasks containing comments on what checks were done (green text), and if the particular check was done successfully ( OK ) or not ( Nein ). See figure 16 for an example. 3.2 Admin Area After a walkthrough of the functions provided by the Virtual Unix Lab to it s users and students, this section concentrates on some of the administrative actions that are available to administrators of the Virtual Unix Lab. Again, here are the various impressions to show these aspects, in screenshot format. 1. Users with administrative privileges in the Virtual Unix Lab have to log into the system like normal users too, the system will know they have admin status, and display available actions as appropriate. Available actions are updating & changing user settings ( Benutzerdaten ), editing or creating new exercises ( Uebungs-Setup ), looking at past and future exercises booked by all users ( Buchungen ) and seeing what users said in the survey ( Feedback, not covered here). Figure 17 shows the admin

12 Figure 13: Display of the exercise text

13 Figure 14: Logging into lab machines for the exercise Figure 15: End of exercise

14 Figure 16: Feedback on an exercise taken

15 Figure 17: Administrator s login & menu login screen. All the menu items available in this menu will be presented in the following paragraphs. 2. Selecting Benutzerdaten displays a list of all users of the Virtual Unix Lab as shown in figure 18, including their student ID ( MatrikelNr ), last and first name, login (which defaults to the address entered when signing up, but can be changed by users later) as well as the type of a user. Types are defined for users and administrators, with an additional type reserved for teachers of the system ( dozent ) for future additions. Two buttons are available right to each user, the lower button to delete the user from the system (and all his associated data, like exercises he took), and the upper one to edit the data of a certain user. 3. When pressing the button to edit a user s data, the form displayed in figure 19 will be presented to change a users data. Interesting items here are the user type ( Benutzer-Typ ), which is usually User for students, and Admin for administrators of the Virtual Unix Lab. If a new user s login has not been confirmed yet by entering the authentication token mailed to the user when registering, the Anmeldung bestätigt? field will be set to Nein to indicate the login hasn t been confirmed, with the authentication token being displayed for confirmation & verification. If a user can t remember his password, a new one can be filled in (twice, for confirmation) to set a new one. During tests with a group of 40 computer science students over the duration of one semester in summer 2004, it was amazing how many students managed to forget their password I have forgotten my password apparently isn t a user-support myth (only)!

16 Figure 18: Managing users

17 Figure 19: Editing user specific data

18 4. Listing all exercises booked by all users in the past and future can be achieved by selecting Buchungen from the menu. The list, displayed in figure 20, contains login name of the user and what exercise he booked, including date & time and also an indicator if the exercise is still to be taken ( freigegeben ) or already done. To the right of each exercises, two buttons are placed, just as in the for for editing user data. The lower button can be used to delete all traces of a past exercise (not available to normal users to prevent them from destroying evidence), the upper button can be used to retrieve feedback on a particular exercise for both admin and student users. 5. When an administrator selects feedback on a certain exercise, he will get similar feedback as normal users (see figure 21), containing data if single tasks of the exercise were solved successfully, and some hints what the system did to test (in green font). In addition to normal users, administrators will get an overview on how all students taking the same exercise performed, giving numbers on how many did ( Bestanden ) or did not ( Nicht bestanden ) manage to solve the task successfully, as well as an overall number of students who did the exercise. In addition to absolute numbers and percentage, bars of o s are printed to give sort of a graphical overview, making it more visible how the overall group performed. 6. When selecting the Uebung-Setup menu item, various settings for new and existing exercises displayed in figure 22 can be changed. First, a new menu row will appear which allows managing the list of lab machines available ( Rechner verwalten ), the list of harddisk images available for them ( Images verwalten ) as well as creating a new exercise ( neue Übung erstellen). Furthermore, a list of all existing exercises is given, with two buttons on the right. The rightmost button can be used to delete an exercise (including all data available on that exercise, esp. past exercises taken by students - use with care!). The other button can be used to change various settings of the exercise, using the same menus as when creating a new exercise, see below. 3.3 Creating New Exercises 1. When creating new exercises or editing existing ones, a list of lab machines needs to be known. This list can be edited by selecting Rechner verwalten in the previous menu, and using the user interface shown in figure 23. Buttons besides the entries are used to delete entries for lab machines, or edit properties, with hostnames being the only property right now. 2. A similar list can be retrieved for all harddisk images available, that can be deployed on the lab machines. As can be seen in figure 24, harddisk images are available for NetBSD 1.6.2/sparc and Solaris 9/sparc right now. Adding other harddisk images for other operating systems like Linux, or special setups like troubleshooting would be easily possible. At this point, only one kind of lab machine is available (two Sun SPARCstation 4), and thus no additional checks are needed if an image can be deployed on a certain machine. This may change in the future! 3. When choosing to create a new exercises, three screens have to be filled with data. The first one asking for general information on the new exercise, like a short description ( Kurzbezeichnung ), one-line description ( Bezeichnung ) and a username that should be allowed exclusive access to the exercises ( Nur für, used for administrative exercises, see below). Time for preparing the lab machines ( Vorlauf ), duration of the exercise ( Dauer ) as well as time for analyzing the lab machines ( Nachlauf ) is needed next, each given in hours and minutes. If an exercise should not be repeatable like for a real test, not just a lab exercise, this can be done by setting the exercise to be not repeatable ( Wiederholbar? ). Next item needed is file placed in the filesystem of the Virtual Unix Lab which contains the exercise text ( Pfad auf die Textdatei ) and which needs to contain some special PHP calls to allow giving feedback (not covered here).

19 Figure 20: Managing booked exercises, past & future

20 Figure 21: Retrieving feedback on a group s performance

21 Figure 22: Editing various properties of an exercise

22 Figure 23: Managing lab machines Figure 24: Managing disk images for lab machines

23 Figure 25: Entering basic data for a new exercise Finally, design plans for the Virtual Unix Lab include a tutorial component which can give help on demand, which is what the filename with additional information ( Pfad auf zusätzliches Info-Material ) is intended for, but not used right now. Figure 25 displays the first screen asking for all this data. 4. The second part of creating a new exercise consists of deciding which lab machines are needed for the exercise ( verwendeter Rechner ), and which harddisk image they should get installed ( benötigtes Image ). Pressing the Rechner-Konfiguration hinzufügen button will add the machine/image-combination to the exercise. A list of machines & images already part of the image are printed below that, with buttons available to delete the machine/image combination or to edit it. To make sure several lab machines get setup for an exercise, they must be added with an appropriate exercise here. In the example screenshot displayed in figure 26, only one lab machine running NetBSD would be prepared for the exercise (unless others were added). 5. The third and last step of creating a new exercise consists of defining which tests are made at the end of the exercise to determine if the (parts of) the exercise were performed successfully or not. Testing can be done via a number of so-called Check-Scripts, which exist to test a number of aspects of a system. Parameters can be passed to the scripts to adjust what they do (see below). As an exercise can involve several lab machines, and as each lab machine can run a different configuration (client, server,...), it s important to define on which machine a check script runs ( Läuft auf Rechner ). The selected check script will be ran on the named machine with the given parameters at the end of of an exercise, and store the result of the script success or failure

24 Figure 26: Defining machines & configuration for a new exercise 1 [?] p. 111 in the database for giving feedback later. As a simple display of success or you failed may not be too helpful 1, an additional description of what exactly was tested and was either passed or failed can be given ( Bezeichnung für Auswertung ). As with the selection of lab machines used for an exercise, several checks can be added to an exercise ( Check hinzufügen ), completion of the new exercise can be indicated by pressing the Fertig button of the form displayed in figure All scripts available to perform checks on the lab machines are stored on the filesystem of the Virtual Unix Lab server. A list which allows easy selection of a check-script is made available through the PHP framework displayed in figure 28. Scripts are available to test various aspects of a system, either being independent of the operating system ( check-* ), work on all Unix systems ( unix-check-* ) or only on a particular Unix flavour ( netbsd-check-*, solaris-check-* ). If a certain subsystem allows various properties to be changed, that s also encoded in the check script s filename ( unix-check-user-*, check-file-* ). Future incarnations of the Virtual Unix Lab may also include check scripts to run on Windows systems. 7. Figure 29 shows an exercise that has some check scripts defined to be ran upon completion of the exercise:. For each check, buttons are available to remove it from the list of checks to run, and to edit the data stored for the particular check. 8. When choosing to edit a particular check, all the parameters from the previous form can be changed using the form displayed in figure 30: script, parameters, description for feedback, and on which machine to run the script. In addition, information on what the script does is printed in addition to a list of parameters that the script takes, including name of the variable, the default value (if applicable), and a description of the parameters.

25 Figure 27: Adding checks for a new exercise Figure 28: A list of available check-scripts

26 Figure 29: An exercise with two checks defined

27 Figure 30: Editing data of a certain check

28 The information on purpose of a check-script and list of parameters including their description is retrieved from the check scripts all check scripts are expected to allow querying them for these informations. 9. A typical exercise consists of about single checks to run at the end. Entering all the data for all these checks via the web frontend is possible, but tiresome. To solve this problem, an alternative way to enter data on check scripts into the database had to be constructed 2. As the text of an exercise already contains calls to PHP functions to retrieve success of the particular check (using the check numbers shown in the previous screenshots), putting data near these calls was an obvious solution. So, instead of putting Do task #1 <?php auswertung_teiluebungen( 916, 917);?> Do task #2... into the exercise text s PHP file to describe task #1 and associate checks numbered 916 and 917 with them as e.g. defined in figure 29, the layout can first be a bit changed (no functional change): Do task #1 <?php auswertung_teiluebungen( 916, 917 );?> and after this layout change, comments can be made in the PHP code to add the data for the checks as comments as shown in figure 31. With an appropriate preprocessor, the data can be extracted and stored in the database. In the above example, the check-numbers are not known when writing the exercise text, and left as XXX. When running the preprocessor, it will extract data from the PHP comments, and store them into the database. Figure 32 shows running the preprocessor, which fills in the now-known check-numbers into the PHP calls for giving feedback as shown in figure 33. Using this framework, it is possible to keep all the data for an exercise text, which check script, on which lab machine to run it, any possible parameters as well as text for feedback in one file, which is a lot easier to maintain. The web interface can still be used to edit existing exercises. More words could be spent here on exercise verification, stereotypes and language design, system front-ends, domain specific languages and design patterns, but it would be beyond the introductional character of this paper and be published elsewhere. 4 Setup 4.1 Hardware The following machine is used as server machine: 2 [?] p. 96

29 Figure 31: Embedding check-data into exercise text comments Figure 32: Extracting check data into the database

30 Figure 33: The preprocessor has filled in the check-script numbers Sun SPARCstation 5, 85MHz 192 MB RAM 3* external SCSI disk additional SBus ethernet card Runs NetBSD 1.6.2/sparc The following machines are used as lab clients: Two Sun SPARCstation 4, 110MHz 64 MB RAM 1 GB internal SCSI disk Run NetBSD 1.6.2/sparc or Solaris 9/sparc The ultimate goal here is to use virtual machines instead of real hardware. When the Virtual Unix Lab project was started, no hardware for running virtual machines was available. 3 [?] 4.2 Lab Machine Installation Installation of the lab machine is done by using the server to act as DHCP, RARP and NFS server to lab-internal network. When a new exercise is to be prepared, the lab clients are netbooted, so they are independent of any operating system (and it s possible damaged state). From the netbooted environment, a new harddisk image is written to the lab client s harddisk. The image-deployment techniques used here were developed in the g4u 3 project.

31 telnet ssh ftp telnet ssh ftp telnet ssh ftp Figure 34: Accessing the lab clients 4.3 Restricting Access to Lab Machines Protecting the lab clients from unauthorized access during exercises was one of the design goals of the Virtual Unix Lab, but it was also considered important to not hook up lab clients directly to the production network of the University of Applied Sciences of Regensburg (FH Regensburg) to prevent students having access to the lab machines abusing their admin privileges. As a result, the lab clients were placed inside their own network, with only the lab machines and the Virtual Unix Lab server. The Virtual Unix Lab server acts as firewall, and access to the clients is realized by redirecting access to certain ports on the server to the client machines, as can be seen in figure 34. The firewall is configured dynamically to allow access from a single client when an exercise starts (see figure 11), and access is disabled at the end of an exercise either when time runs out or the user indicates he s done, just before verification of the exercise results starts. 4.4 Software The following software was used to create the Virtual Unix Lab: Apache: Web server for the user interface and exercise text Postgres: Database engine; MySQL didn t compile on NetBSD/sparc, and Postgres has worked very fine IPfilter: Firewalling software by Darren Reed [?] NetBSD: Operating system for the Virtual Unix Lab server and clients Solaris: Fine operating system, for clients of the Virtual Unix Lab PHP: Scripting engine for the web-based user interface Perl: Scripting engine for result verification and some internals Bourne shell: Scripting engine for result verification, client deployment and more internals

32 5 Current Status Current status of the Virtual Unix Lab is that it works(!). Two full-length exercises have been worked out and are available for students: Network Information System (NIS) Network File System (NFS) The system was tested successfully in summer semester 2004 by 40 students during course System Administration at the department of computer science at the University of Applied Sciences (Fachhochschule) Regensburg. An upgrade of the server hardware to a modern PC is pending. 6 Future Perspectives Many ways are possible to improve the system on one end, but there are also a number of perspectives that the system in it s current incarnation can be used for. Here s an itemized list: Funding badly needed, for keeping the system running, and any of the following items Define more exercises: Web- and Mail server, including spamfilters etc. DNS, DHCP, LDAP, Samba Database setup & tuning System and network troubleshooting Security post-morten analysis and prevention Add more options for lab machines: Real hardware (PCs, Sun E15000) Emulated (virtual) hardware: VMware, Xen,... More operating systems: Linux, Windows Internationalisation Implement a tutoring system Think about user modeling Do a lot of polishing and internal restructuring for the above items Funding! Very very badly needed!

Sysadmin Training. Virtual Unix Lab

Sysadmin Training. Virtual Unix Lab Sysadmin Training in the Virtual Unix Lab Sysadmin Training in the Virtual Unix Lab p.1/15 Background Context: system admin training Problem: root access for users No Root - no practicing of many things

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

Fedora Core: Made Simple

Fedora Core: Made Simple Table of Contents Installing Fedora...2 Before you begin...2 Compatible Hardware...2 Minimum Requirements...2 Disk Space Requirements...2 Help! Booting from the CD ROM Drive Fails!...2 Installing Fedora

More information

Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5

Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5 Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5 Title: Getting Started with ESX Server 3i Embedded Revision: 20071022 Item: VMW-ENG-Q407-430 You can

More information

Deploying Cisco UCS Central

Deploying Cisco UCS Central This chapter includes the following sections: Obtaining the Cisco UCS Central Software from Cisco, page 1 Using the Cisco UCS Central OVA File, page 2 Using the Cisco UCS Central ISO File, page 4 Logging

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Back Up/Restore Hard Drives And Partitions With CloneZilla Live

Back Up/Restore Hard Drives And Partitions With CloneZilla Live By Falko Timme Published: 2008-11-25 17:35 Version 1.0 Author: Falko Timme Last edited 11/17/2008 This tutorial shows how you can back up and restore hard drives and partitions

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Requirements for ALEPH 500 Installation

Requirements for ALEPH 500 Installation PROJECT DOCUMENTATION Requirements for ALEPH 500 Installation Ltd., 2002, 2003 Last Update: July 31, 2003 Table of Contents 1. SERVER HARDWARE AND SOFTWARE REQUIREMENTS... 3 1.1 Server...3 1.2 Filesystem

More information

Demo KACE K1000 System Management Appliance

Demo KACE K1000 System Management Appliance Demo KACE K1000 System Management Appliance Quick Start Guide Product Domain: Cloud Client Computing Author: Dan Coleman Version: 1.01 Table of Contents 1 Product Overview... 3 1.1 Lab Preparation Considerations

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

Cmpt 101 Lab 1 - Outline

Cmpt 101 Lab 1 - Outline Cmpt 101 Lab 1 - Outline Instructions: Work through this outline completely once directed to by your Lab Instructor and fill in the Lab 1 Worksheet as indicated. Contents PART 1: GETTING STARTED... 2 PART

More information

WHAT IS THE CONFIGURATION TROUBLESHOOTER?

WHAT IS THE CONFIGURATION TROUBLESHOOTER? Paper 302-2008 Best Practices for SAS Business Intelligence Administrators: Using the Configuration Troubleshooter to Keep SAS Solutions and SAS BI Applications Running Smoothly Tanya Kalich, SAS Institute

More information

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION Timothy Bower Kansas State University at Salina 785-826-2920 tim@ksu.edu ABSTRACT This paper describes how virtualization technology was used to

More information

SSL VPN Reinstallation

SSL VPN Reinstallation SSL VPN Reinstallation This software reinstallation procedure describes how to reinstall the software onto a previously formatted and programmed hard disk drive (HDD) on the Contivity SSL VPN 1000 card.

More information

Smart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging. Quick-Start Manual

Smart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging. Quick-Start Manual Mobiketa Smart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging Quick-Start Manual Overview Mobiketa Is a full-featured Bulk SMS and Voice SMS marketing script that gives you control over your

More information

This FAQ is only applicable for hostings ordered after 23/6/2010

This FAQ is only applicable for hostings ordered after 23/6/2010 Webhosting FAQ This FAQ is only applicable for hostings ordered after 23/6/2010 1. How do I access my Webhosting control panel?... 1 2. On which server is my hosting set up (IP)?... 4 3. How do I install

More information

SEP Sesam Quick Start

SEP Sesam Quick Start SEP Sesam Quick Start Version 1.2 Linux Guide This guide will jumpstart your SEP Sesam deployment by walking you through the basics of installing the SEP Sesam server, clients, and configuring a backup

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

SOA Software API Gateway Appliance 6.3 Administration Guide

SOA Software API Gateway Appliance 6.3 Administration Guide SOA Software API Gateway Appliance 6.3 Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names, logos,

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Xcalar Installation Guide

Xcalar Installation Guide Xcalar Installation Guide Publication date: 2018-03-16 www.xcalar.com Copyright 2018 Xcalar, Inc. All rights reserved. Table of Contents Xcalar installation overview 5 Audience 5 Overview of the Xcalar

More information

Subscriptions and Recurring Payments 2.X

Subscriptions and Recurring Payments 2.X Documentation / Documentation Home Subscriptions and Recurring 2.X Created by Unknown User (bondarev), last modified by Unknown User (malynow) on Mar 22, 2017 Installation Set up cron (for eway) Configuration

More information

eftp Application User Guide

eftp Application User Guide Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 VMware Infrastructure 3 Primer Revision: 20090313 Item: EN-000021-02 You can find the most up-to-date technical documentation

More information

Welcome to the RISD Materials /Media Center Online Public Access Catalog

Welcome to the RISD Materials /Media Center Online Public Access Catalog Welcome to the RISD Materials /Media Center Online Public Access Catalog For years now, the Media Center has used Term-Lite as the online booking program. Starting in the 2016-2017 school year, the change

More information

BIF713. Operating Systems & Project Management. Instructor: Murray Saul Webpage: murraysaul.wordpress.

BIF713. Operating Systems & Project Management. Instructor: Murray Saul   Webpage: murraysaul.wordpress. BIF713 Operating Systems & Project Management Instructor: Murray Saul E-mail: murray.saul@senecacollege.ca Webpage: murraysaul.wordpress.com Today's Topics Types of computer servers at Seneca College Introduction

More information

Cloud Control Panel User Manual v1.1

Cloud Control Panel User Manual v1.1 Cloud Control Panel User Manual v1.1 March 2011 Page: 1 / 27 Contents 1 Introduction...3 2 Login procedure...4 3 Using the Dashboard...7 3.1 Enabling the Detailed View...8 3.2 Stopping the component...9

More information

KEIL software. Index of contents INSTALLATION

KEIL software. Index of contents INSTALLATION Index of contents 1. Important information 1.1. Requirements 1.2. Additional language files 1.3. Thumbnail creation and resizing 1.4. Data protection and shop security 2. Installation 2.1. FTP upload 2.2.

More information

Getting Started with PHP

Getting Started with PHP SECTION I AL Getting Started with PHP LESSON 3: Learning PHP Syntax LESSON 5: Debugging Code MA LESSON 4: Working with Variables TE LESSON 2: Adding PHP to a Web Page RI LESSON 1: Setting Up Your Workspace

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.0 Embedded vcenter Server 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Documentation. OTRS Appliance Installation Guide. Build Date:

Documentation. OTRS Appliance Installation Guide. Build Date: Documentation OTRS Appliance Installation Guide Build Date: 12/10/2014 OTRS Appliance Installation Guide Copyright 2001-2014 OTRS AG This work is copyrighted by OTRS AG. You may copy it in whole or in

More information

Provisioning the K1000 Agent

Provisioning the K1000 Agent Provisioning the K1000 Agent Agent provisioning is the task of installing the K1000 Agent on devices you want to add to K1000 inventory using the Agent. About the K1000 Agent The K1000 Agent is an application

More information

VMware View Upgrade Guide

VMware View Upgrade Guide View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for

More information

NI Linux Real-Time. Fanie Coetzer. Field Sales Engineer SA North. ni.com

NI Linux Real-Time. Fanie Coetzer. Field Sales Engineer SA North. ni.com 1 NI Linux Real-Time Fanie Coetzer Field Sales Engineer SA North Agenda 1. Hardware Overview 2. Introduction to NI Linux Real-Time OS Background & Core Technology Filesystem Connectivity and Security 3.

More information

Linux Home Lab Environment

Linux Home Lab Environment Environment Introduction Welcome! The best way to learn for most IT people is to actually do it, so that s the goal of this selfpaced lab workbook. The skills outlined here will begin to prepare you for

More information

to arrive at the system information display. In MacOS X use the menus

to arrive at the system information display. In MacOS X use the menus The Math/CS 466/666 Linux Image in VirtualBox This document explains how to install the Math/CS 466/666 Linux image onto VirtualBox to obtain a programming environment on your personal computer or laptop

More information

Forescout. Quick Installation Guide. Single Appliance. Version 8.1

Forescout. Quick Installation Guide. Single Appliance. Version 8.1 Forescout Version 8.1 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0 ForeScout CounterACT Single CounterACT Appliance Version 8.0 Table of Contents Welcome to CounterACT Version 8.0... 4 CounterACT Package Contents... 4 Overview... 5 1. Create a Deployment Plan... 6 Decide

More information

Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3

Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 From Cisco s website, here are the minimum requirements for CCP 2.7 and CCP 2.8: The following info comes from many

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP Chapter 1 : Microsoft SQL Server Step by Step - PDF Free Download - Fox ebook Your hands-on, step-by-step guide to building applications with Microsoft SQL Server Teach yourself the programming fundamentals

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Adding Groups to Groups

Adding Groups to Groups 108 Authenticating and Authorizing Accounts 4 Select the Project X group, and drag it from the Groups drawer to the Other Groups list. Notice that as you drag the group, the pointer changes from an arrow

More information

SANS Institute - Operations Essentials. Operating System Installation Guidelines. Windows XP Professional Installation. Creating Boot Disks

SANS Institute - Operations Essentials. Operating System Installation Guidelines. Windows XP Professional Installation. Creating Boot Disks SANS Institute - Operations Essentials Operating System Installation Guidelines The following document guides you step-by-step through the process of creating a dualboot system. Even if you do not use

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

ORACLE LOG SWITCH OPERATING INSTRUCTIONS

ORACLE LOG SWITCH OPERATING INSTRUCTIONS 16 March, 2018 ORACLE LOG SWITCH OPERATING INSTRUCTIONS Document Filetype: PDF 294.21 KB 0 ORACLE LOG SWITCH OPERATING INSTRUCTIONS During a log switch, Oracle closes the current redo log group, opens

More information

WA2031 WebSphere Application Server 8.0 Administration on Windows. Student Labs. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc.

WA2031 WebSphere Application Server 8.0 Administration on Windows. Student Labs. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. WA2031 WebSphere Application Server 8.0 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

Getting Started. System Requirements. Installation

Getting Started. System Requirements. Installation Getting Started NexentaOS is an OpenSolaris distribution for your x86/x64 desktop, laptop, or server - with a fast and easy-to-install regular releases and a selection of tightly-integrated excellent applications.

More information

Table of Contents Authoring portal Books Slides Add Slides Clickable Areas... 7

Table of Contents Authoring portal Books Slides Add Slides Clickable Areas... 7 Table of Contents Table of Contents... 1 1. Introduction... 4 2. Authoring functions... 5 2.1 Authoring portal... 5 2.2 Books... 5 2.2.1 Creating books... 5 2.2.2 Editing Books... 6 2.2.3 Deleting Books...

More information

OpenStack Havana All-in-One lab on VMware Workstation

OpenStack Havana All-in-One lab on VMware Workstation OpenStack Havana All-in-One lab on VMware Workstation With all of the popularity of OpenStack in general, and specifically with my other posts on deploying the Rackspace Private Cloud lab on VMware Workstation,

More information

Getting Started with CMS

Getting Started with CMS CHAPTER 3 This chapter contains these sections that describe the Cluster Management Suite (CMS) on the Catalyst 3750 switch: Understanding CMS section on page 3-1 Configuring CMS section on page 3-8 Displaying

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Patagonia Cluster Project Research Cluster

Patagonia Cluster Project Research Cluster Patagonia Cluster Project Research Cluster Clusters of PCs Multi-Boot and Multi-Purpose? Christian Kurmann, Felix Rauch, Michela Taufer, Prof. Thomas M. Stricker Laboratory for Computer Systems ETHZ -

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Service Desk 7.2 Installation Guide. March 2016

Service Desk 7.2 Installation Guide. March 2016 Service Desk 7.2 Installation Guide March 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

Oracle Hyperion EPM Installation & Configuration ( ) NEW

Oracle Hyperion EPM Installation & Configuration ( ) NEW Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 Oracle Hyperion EPM 11.1.2 Installation & Configuration (11.1.2.4) NEW Duration: 4 Days What you will learn NEW COURSE! This

More information

Optimizes the navigation and lets visitors search by categories, price ranges, color, and other product attributes.

Optimizes the navigation and lets visitors search by categories, price ranges, color, and other product attributes. Documentation / Documentation Home Layered Navigation Created by Unknown User (bondarev), last modified by Malynow, Alexey on Feb 22, 2016 Installation Set up cron Configuration Basic Configuration Filters

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Optional Lab. Identifying the Requirements. Configuring Windows 7 with virtualization. Installing Windows Server 2008 on a virtual machine

Optional Lab. Identifying the Requirements. Configuring Windows 7 with virtualization. Installing Windows Server 2008 on a virtual machine Optional Lab Appendix D As you go through Microsoft Windows Networking Essentials for the 98-366 exam, you may want to get your hands on Windows Server 2008 and dig a little deeper. That makes sense. While

More information

Endian Proxy / Firewall

Endian Proxy / Firewall Endian Proxy / Firewall Created October 27, 2006 by Bruce A. Westbrook Revisions: Introduction This document describes the step by step process of installing and configuring the Endian Firewall, Community

More information

Getting started with System Center Essentials 2007

Getting started with System Center Essentials 2007 At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management

More information

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective CSET 3400 Unix System Administration (3 semester credit hours) CSET Elective IT Elective Current Catalog Description: Commands and methods to install and manage a UNIX system. System administration topics

More information

District 5910 Website Quick Start Manual Let s Roll Rotarians!

District 5910 Website Quick Start Manual Let s Roll Rotarians! District 5910 Website Quick Start Manual Let s Roll Rotarians! All Rotarians in District 5910 have access to the Members Section of the District Website THE BASICS After logging on to the system, members

More information

National College of Ireland BSc in Computing 2017/2018. Deividas Sevcenko X Multi-calendar.

National College of Ireland BSc in Computing 2017/2018. Deividas Sevcenko X Multi-calendar. National College of Ireland BSc in Computing 2017/2018 Deividas Sevcenko X13114654 X13114654@student.ncirl.ie Multi-calendar Technical Report Table of Contents Executive Summary...4 1 Introduction...5

More information

Parallels Server 4.0 for Mac Bare Metal Edition

Parallels Server 4.0 for Mac Bare Metal Edition Parallels Server 4.0 for Mac Bare Metal Edition Installation Guide Copyright 1999-2010 Parallels Holdings, Ltd. Parallels Holdings, Ltd. c/o Parallels International GMbH. Parallels International GmbH Vordergasse

More information

How-To Guide for Administrators

How-To Guide for Administrators Users The Users area enables you to add users, reset their passwords, manage their profile data, and access their MyTeachingStrategies account as that user. The main Users screen provides an overview of

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

ADOBE DREAMWEAVER CS4 BASICS

ADOBE DREAMWEAVER CS4 BASICS ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,

More information

You will save an Auto Server Setup file and use it in the next exercise.

You will save an Auto Server Setup file and use it in the next exercise. Initial Mac OS X Server Configuration 51 30 You are now at the Review pane. Do not click the Set Up button. Instead, leave your Mac OS X Server at this Review pane. You will save an Auto Server Setup file

More information

Guides for Installing MS SQL Server and Creating Your First Database. Please see more guidelines on installing procedure on the class webpage

Guides for Installing MS SQL Server and Creating Your First Database. Please see more guidelines on installing procedure on the class webpage Guides for Installing MS SQL Server and Creating Your First Database Installing process Please see more guidelines on installing procedure on the class webpage 1. Make sure that you install a server with

More information

Getting Started Guide. Installation and Setup Instructions. For version Copyright 2009 Code 42 Software, Inc. All rights reserved

Getting Started Guide. Installation and Setup Instructions. For version Copyright 2009 Code 42 Software, Inc. All rights reserved Installation and Setup Instructions For version 06.11.2009 Copyright 2009 Code 42 Software, Inc. All rights reserved About This Guide This guide shows you how to install, activate and back up with CrashPlan

More information

Administering vrealize Log Insight. 05-SEP-2017 vrealize Log Insight 4.3

Administering vrealize Log Insight. 05-SEP-2017 vrealize Log Insight 4.3 Administering vrealize Log Insight 05-SEP-2017 4.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Preparing to Install Components

Preparing to Install Components CHAPTER 2 This chapter provides the information you need to prepare for a successful Broadband Access Center for Cable (BACC) component installation, including these topics: Broadband Access Center for

More information

SUSE Cloud Admin Appliance Walk Through. You may download the SUSE Cloud Admin Appliance the following ways.

SUSE Cloud Admin Appliance Walk Through. You may download the SUSE Cloud Admin Appliance the following ways. SUSE Cloud Admin Appliance Walk Through First before you proceed with deploying the Admin Appliance you must go through and answer the questionnaire to ensure you have an idea of the scope of the project

More information

ADempiere Community Document. Virtual Appliance 3.5.3a

ADempiere Community Document. Virtual Appliance 3.5.3a ADempiere Community Document Virtual Appliance 3.5.3a INFORMATION IS FREE - U have to Know PEOPLE ARE NOT - U have to Pay CONTRIBUTORS ARE PRICELESS - U have to Be Title: Adempiere AVA 3.5.3a Author: Paul

More information

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud SaaSaMe Transport Workload Snapshot Export for Alibaba Cloud Contents About This Document... 3 Revision History... 3 Workload Snapshot Export for Alibaba Cloud... 4 Workload Snapshot Export Feature...

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

Connectware Manager Getting Started Guide

Connectware Manager Getting Started Guide Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi

More information

Spitzer Space Telescope. Release Notes

Spitzer Space Telescope. Release Notes Spitzer Space Telescope Release Notes Leopard Version 9 June 18, 2008 Issued by the Spitzer Science Center California Institute of Technology Pasadena, California USA http://ssc.spitzer.caltech.edu/ 1

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Amigopod Release Notes. Updating to Amigopod Document Overview. Overview of the Update Process. Verify the System s Memory Limit

Amigopod Release Notes. Updating to Amigopod Document Overview. Overview of the Update Process. Verify the System s Memory Limit Amigopod 3.5.4 Release Notes This document contains release information for version 3.5.4 of the Aruba Amigopod visitor management appliance. Document Overview This document is organized into the following

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Incident Response Tools

Incident Response Tools Incident Response Tools James Madison University Dept. of Computer Science June 13, 2013 1 Introduction Being successfully attacked is inevitable. A determined hacker WILL be able to penetrate your network.

More information

Synology Diskstation User Guide Based On Dsm 4.2

Synology Diskstation User Guide Based On Dsm 4.2 Synology Diskstation User Guide Based On Dsm 4.2 This user's guide will guide you through the following: Chapter 1: via the web-based DiskStation Manager (DSM) or file sharing protocols (CIFS, AFP, etc).

More information

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Quick Start Guide Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Introduction 2 About the CWI 3 Getting Started 4 Setting Up the Router and CWI Client 5 Getting Started

More information

Networking Guide for Redwood Manager

Networking Guide for Redwood Manager Issue 4, August 2014 Networking Guide for Redwood Manager General The Redwood engine controls the lighting policies, communicates to the Redwood gateways, distributes low-voltage DC power to the fixtures,

More information

Using Integration Utility

Using Integration Utility CHAPTER 3 CiscoWorks Integration Utility downloads Network Management Integration Data Bundle (NMIDB) and integrates LAN Management Solutions (LMS) applications, icons, MIBs, and traps with third-party

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

Amahi Instruction Manual

Amahi Instruction Manual History of Amahi Chapter 1 Installing fedora 10 and Amahi Home Digital Assistant (HDA) Chapter 2 Advanced Hard drive Partitioning Chapter 3 YOUR DHCP/DNS OPTIONS Chapter 4 Network Troubleshooting Chapter

More information

One of the fundamental kinds of websites that SharePoint 2010 allows

One of the fundamental kinds of websites that SharePoint 2010 allows Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental

More information